• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

OneClik APT campaign targets energy sector with stealthy backdoors

 | 

APT42 impersonates cyber professionals to phish Israeli academics and journalists

 | 

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Security Affairs newsletter Round 523 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 523 by Pierluigi Paganini – INTERNATIONAL EDITION

Pierluigi Paganini May 11, 2025

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

Ascension reveals personal data of 437,329 patients exposed in cyberattack
Operation Moonlander dismantled the botnet behind Anyproxy and 5socks cybercriminals services
A cyber attack briefly disrupted South African Airways operations
Cybercriminal services target end-of-life routers, FBI warns
Russia-linked ColdRiver used LostKeys malware in recent attacks
SonicWall fixed SMA 100 flaws that could be chained to execute arbitrary code
The LockBit ransomware site was breached, database dump was leaked online
Cisco fixed a critical flaw in its IOS XE Wireless Controller
U.S. CISA adds GoVision device flaws to its Known Exploited Vulnerabilities catalog
Polish authorities arrested 4 people behind DDoS-for-hire platforms
Play ransomware affiliate leveraged zero-day to deploy malware
Canary Exploit tool allows to find servers affected by Apache Parquet flaw
Unsophisticated cyber actors are targeting the U.S. Energy sector
NSO Group must pay WhatsApp over $167M in damages for attacks on its users
U.S. CISA adds FreeType flaw to its Known Exploited Vulnerabilities catalog
Samsung MagicINFO flaw exploited days after PoC exploit publication
Experts warn of a second wave of attacks targeting SAP NetWeaver bug CVE-2025-31324
U.S. CISA adds Langflow flaw to its Known Exploited Vulnerabilities catalog
Google fixed actively exploited Android flaw CVE-2025-27363
New ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDR
Smishing on a Massive Scale: ‘Panda Shop’ Chinese Carding Syndicate
Kelly Benefits December data breach impacted over 400,000 individuals
A hacker stole data from TeleMessage, the firm that sells modified versions of Signal to the U.S. gov
Experts shared up-to-date C2 domains and other artifacts related to recent MintsLoader attacks
Sansec uncovered a supply chain attack via 21 backdoored Magento extensions
US authorities have indicted Black Kingdom ransomware admin
Malicious Go Modules designed to wipe Linux systems

International Press – Newsletter

Cybercrime

Yemeni Man Charged in Federal Indictment Alleging He Sent ‘Black Kingdom’ Malware to Extort Businesses, Schools, and Medical Clinics

Big Game Ransomware: the myths experts tell board members

DragonForce Ransomware Cartel attacks on UK high street retailers: walking in the front door 

From Callback Phishing to Extortion: Luna Moth Abuse Reamaze Helpdesk and RMM Tools Against U.S. Legal and Financial Sectors  

Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams  

Ransomware Attackers Leveraged Privilege Escalation Zero-day 

DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains  

LockBit ransomware gang hacked, victim negotiations exposed

Pakistani Firm Shipped Fentanyl Analogs, Scams to US  

PowerSchool hacker now extorting individual school districts

Cyber criminal services target EoL Routers to Launch attack and hide their activities

Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted 

LOCKBIT RANSOMWARE LEAKED

One Small Click for an Admin, One Giant Breach for the Organization 

Malware

iClicker site hack targeted students with malware via fake CAPTCHA

Backdoor found in popular ecommerce components  

Stealthy Linux backdoor leveraging residential proxies and NHAS reverse SSH  

Malicious PyPI Package Targets Discord Developers with Remote Access Trojan  

Backdooring the IDE: Malicious npm Packages Hijack Cursor Editor on macOS 

Hacking

The Signal Clone the Trump Admin Uses Was Hacked  

Unsafe at Any Speed: Abusing Python Exec for Unauth RCE in Langflow AI  

Bring Your Own Installer: Bypassing SentinelOne Through Agent Version Change Interruption

When Space Goes Dark: Inside the Cyberattack on Poland’s Space Agency

My Zero Day Quest & BlueHat Podcast        

SAP NetWeaver Flaw Lets Hackers Take Full Control: CVE-2025-31324 Explained 

Arctic Wolf Observes Exploitation of Path Traversal Vulnerability in Samsung MagicINFO 9 Server (CVE-2024-7399)  

Canary Exploit tool for CVE-2025-30065 Apache Parquet Avro Vulnerability  

Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)  

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code  

CVE-2024-11477- 7-Zip ZSTD Buffer Overflow Vulnerability 

Recently Disclosed SureTriggers Critical Privilege Escalation Vulnerability Under Active Exploitation  

Intelligence and Information Warfare

Russian hackers target Romanian state websites on election day 

COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs  

Tulsi Gabbard Reused the Same Weak Password on Multiple Accounts for Years 

“US on High Alert”: Pentagon Confirms Mysterious Signal Traced to Russian Space Anomaly Now Feared as Major Threat  

MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware

Cybersecurity

Trump Crypto Corruption Intensifies as Abu Dhabi Firm Invests $2 Billion

Update ASAP: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

NSO Group must pay more than $167 million in damages to WhatsApp for spyware campaign  

Unsophisticated Cyber Actor(s) Targeting Operational Technology  

Winning the Fight Against Spyware Merchant NSO 

Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT

Internet tracking: How and why we’re followed online 

Google to pay Texas $1.4 billion in data privacy settlement

Negotiations with the Akira ransomware group: an ill-advised approach 

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)


facebook linkedin twitter

Cybercrime data breach Hacking hacking news information security news IT Information Security malware Newsletter Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini June 27, 2025
OneClik APT campaign targets energy sector with stealthy backdoors
Read more
Pierluigi Paganini June 27, 2025
APT42 impersonates cyber professionals to phish Israeli academics and journalists
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    OneClik APT campaign targets energy sector with stealthy backdoors

    Hacking / June 27, 2025

    APT42 impersonates cyber professionals to phish Israeli academics and journalists

    APT / June 27, 2025

    Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

    Cyber Crime / June 26, 2025

    Cisco fixed critical ISE flaws allowing Root-level remote code execution

    Security / June 26, 2025

    U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

    Security / June 26, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT